搜索结果

找到约 110 项符合 sha 的查询结果

加密解密 A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asyn

A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asynchronous HW/SW crypto acceleration to the Linux kernel, OpenSwan, OpenSSL and applications using DES, 3DES, AES, MD5, SHA, PublicKey, RNGs and more.
https://www.eeworm.com/dl/519/277208.html
下载: 39
查看: 1088

matlab例程 对于信号的奇异性检测

对于信号的奇异性检测,也是一个道理。 % 小波变换用于奇异检测 % 编程人: 沙威(Wei Sha) 安徽大学(Anhui University) ws108@ahu.edu.cn
https://www.eeworm.com/dl/665/294959.html
下载: 73
查看: 1018

加密解密 Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种

Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种,被美国NIST作为DSS(DigitalSignature Standard)。算法中应用了下述参数: p:L bits长的素数。L是64的倍数,范围是512到1024; q:p - 1的160bits的素因子; g:g = h^((p-1)/q) mod p,h满足h < p - 1, h^((p-1)/q) mod p > 1; x:x < q,x为私 ...
https://www.eeworm.com/dl/519/320611.html
下载: 123
查看: 1133

压缩解压 汇聚各种应用密码学密码算法技术源码

汇聚各种应用密码学密码算法技术源码,包括DEC/SHA/RC4/crypt/md5等
https://www.eeworm.com/dl/617/325423.html
下载: 31
查看: 1071

加密解密 Java中常用的加密算法应用

Java中常用的加密算法应用,1. MD5加密,常用于加密用户名密码,当用户验证时。2. SHA加密,与MD5相似的用法,只是两者的算法不同。3. RSA加密,RAS加密允许解密。常用于文本内容的加密。
https://www.eeworm.com/dl/519/328855.html
下载: 154
查看: 1044

加密解密 delphi实现加密算法 CRC32-Dym.................CRC32算法动态码表实现 CRC32-Static..............CRC32算法静态码表实现 MD

delphi实现加密算法 CRC32-Dym.................CRC32算法动态码表实现 \CRC32-Static..............CRC32算法静态码表实现 \MD5.......................MD5算法示例 \SHA.......................SHA算法示例 \DES.......................DES算法示例 \2DES......................双重DES算法示例 \3DES............. ...
https://www.eeworm.com/dl/519/405202.html
下载: 74
查看: 1112

加密解密 the hash function FORK-256,256位的安全散列验证算法

the hash function FORK-256,256位的安全散列验证算法,SHA-256的替代者。
https://www.eeworm.com/dl/519/410149.html
下载: 166
查看: 1039

Java编程 提供JAVA源码

提供JAVA源码,加密解密4种算法,AES, DES ,RSA ,SHA-1,
https://www.eeworm.com/dl/633/410193.html
下载: 197
查看: 1018

VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/686/413130.html
下载: 134
查看: 1053

加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/519/413134.html
下载: 97
查看: 1052